Quantcast
Channel: Tech Talk Security – Steve Puluka
Browsing latest articles
Browse All 4 View Live

Introduction to Cyber Security Risk assessment Process

All of life and business activites have a certain risks associated with them. Cyber Security is no different. These are simply risks that need to be identified and managed like any other business...

View Article


Image may be NSFW.
Clik here to view.

Security Incident vs Breach

Information Security has three core values that need to be protected known as the CIA triad: Confidentiality of the Information: only those with a need to know have access.Integrity of the...

View Article


Two Factor Authentication

With the every increasing list of major internet sites that have data breaches we are used to being notified that the password we use to access a site has been lost and must be changed. One of the...

View Article

Getting Started Improving Cyber Security

For organizations getting started implementing a full Cyber Security Framework following the NIST guidelines the journey can look long, steep and daunting (https://www.nist.gov/cyberframework)....

View Article
Browsing latest articles
Browse All 4 View Live